The subject matter disclosed herein generally relates to improvements in remote monitoring systems and, more particularly, to improvements in video remote monitoring systems.
There are a number of operational issues with modern video surveillance systems. For example, video surveillance systems are often unmonitored with the result that failure of any device, such as camera sensors, is only detected when the video images are required to be monitored.
Another operational issue is that current video surveillance systems operate by having live video streams or video clips sent over the internet in an unencrypted manner presenting a security risk. Particularly, if one can determine where across the internet the video is being transmitted, there is little to no further protection to stop an unwanted user from accessing the unprotected video feed. Particularly, merely locating the transmission path is all that is necessary in many cases to gain access. Thus, a reliance on disorganized signal anonymity transmission is all that currently protects surveillance footage.
Further, another example of an operational issue with modern video surveillance system includes considerations dealing with the installation of the system components. For example, the installation of internet protocol (IP) video systems requires configuration of the customer's internet firewall, which is often beyond the ability of the installer. Further, the multitude of video formats, and signal formats that can be generated from all the different video devices on the market currently means that only select proprietary cameras can be used that generate the specific type and format of video and data files that the security automation system providing the monitoring of the service can understand.
Accordingly, there is a desire for improvements to such video monitoring systems.
According to one embodiment, A system for remote monitoring is provided. The system includes a network including a plurality of communication points that provide a path of communication between connected devices, wherein the network is adapted to communicate via internet resources, a video device that is communicatively connected using the network to an image/alarm converter that is communicatively connected to the video device using the network, and a proprietary router in the network through which the video device is able to connect to the image/alarm converter using a secure communication tunnel established by the proprietary router over the network.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video device includes a camera sensor configured to collect a video signal, and a signal processing device configured to generate an alarm signal based on the collected video signal and transmit, using the proprietary router, the video signal and associated alarm signal to the image/alarm converter through the secure communication tunnel.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the image/alarm converter is configured to receive a video signal and an alarm signal from the video device and process the video signal and the alarm signal into a standard alarm signal, wherein the standard alarm signal is in a format understandable by an automation system, and wherein the automation system is configured to receive the standard alarm signal through the proprietary router using a secure communication tunnel.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video device is a stationary device that occupies a single location.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video device is attached to a mobile device.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video device operates as a stand-alone alarm system.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the system includes a plurality of video devices.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, further including an analytics device that is communicatively connected to the video device through the network using a secure communication tunnel established by the proprietary router.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the analytics device is configured to receive the video signal and the alarm signal from the video device, and temporally compress the video signal based on the alarm signal.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the analytics device temporally compresses the video signal into one or more of a single image and a short video.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the automation system is located at an alarm dispatch center, and wherein the automation system is configured to validate the received alarm signal and video signal, and dispatch alarm resources in response to validation.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video device further includes a digital video recorder (DVR) connected to the camera sensor and including the signal processing device, and a customer terminal (CT) configured to communicatively connect the camera sensor and DVR to the proprietary router using the secure communication tunnel over the network.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video device further includes an associated network video recorder (NVR) configured to record the video stream generated by the associated video camera sensors and is communicatively connected to the proprietary router using the secure communication tunnel over the network, wherein the NVR may be in the form of a network attached storage (NAS) device configured to store at least the video signal and the alarm signal whereby the NVR software in running on a NAS physical device.
According to another embodiment, a method of remote monitoring is provided. The method includes receiving a video signal, at a video device, using a camera sensor of the video device, generating, using a signal processing device of the video device, an alarm signal based on the video signal, providing a secure communication tunnel over a network using a proprietary router located on the network, transmitting the video signal and the alarm signal to an image/alarm converter device using the secure communication tunnel, and generating a standard alarm signal, using the video signal and the alarm signal, wherein the standard alarm signal is in a format understandable by an automation system, and transmitting the standard alarm signal from the image/alarm converter device to the automation system through the proprietary router using the secure communication tunnel.
In addition to one or more of the features described above, or as an alternative, further embodiments may include receiving the video signal and the alarm signal at an analytics device that is located on the network and communicatively connected to the proprietary router, and temporally compressing the video signal based on the alarm signal.
In addition to one or more of the features described above, or as an alternative, further embodiments may include receiving the video signal and alarm signal at the automation system, and validating the received video signal and alarm signal at the automation system.
In addition to one or more of the features described above, or as an alternative, further embodiments may include dispatching alarm resources in response to the validation using the automation system.
According to another embodiment, a video system for remote monitoring is provided. The video system including a computer readable storage medium having program instructions embodied therewith, the program instructions executable by one or more processors of the video system to cause the one or more processors to receive a video signal, at a video device, using a camera sensor of the video device, generate, using a signal processing device of the video device, an alarm signal based on the video signal, provide a secure communication tunnel over a network using a proprietary router located on the network, transmit the video signal and the alarm signal to an image/alarm converter device using the secure communication tunnel, and generate a standard alarm signal, using the video signal and the alarm signal, wherein the standard alarm signal is in a format understandable by an automation system, and transmit the standard alarm signal from the image/alarm converter device to the automation system through the proprietary router using the secure communication tunnel.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video system further includes additional program instructions executable by the one or more processors of the video system to cause the processor to receive the video signal and the alarm signal at an analytics device that is located on the network and communicatively connected to the proprietary router, and temporally compress the video signal based on the alarm signal.
In addition to one or more of the features described above, or as an alternative, further embodiments may include, wherein the video system further includes additional program instructions executable by the one or more processors of the video system to cause the processor to receive the video signal and alarm signal at the automation system, validate the received video signal and alarm signal at the automation system, and dispatch alarm resources in response to the validation using the automation system.
The foregoing features and elements may be combined in various combinations without exclusivity, unless expressly indicated otherwise. These features and elements as well as the operation thereof will become more apparent in light of the following description and the accompanying drawings. It should be understood, however, that the following description and drawings are intended to be illustrative and explanatory in nature and non-limiting.
The foregoing and other features, and advantages of the present disclosure are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
One or more embodiments described herein are directed to a system and/or method for managing remote monitoring using video surveillance. The monitoring system includes a network that includes a plurality of communication points that provide a path of communication between connected devices. Additionally, the network is adapted to communicate via internet resources. The monitoring system also includes at least one video device that is communicatively connected using the network. Further, the monitoring system includes an image/alarm converter that is communicatively connected to the video device using the network. The connections between the elements of the monitoring system are made using a proprietary router that is included as part of the system. The proprietary router is in the network. Further, the video device is able to connect to the image/alarm converter using a secure communication tunnel established by the video device to the proprietary router over the network. The tunnel implementation uses outgoing connections from the edge device to the proprietary router avoiding the need for site specific router configurations such as using a static IP address and/or port forwarding or using other non-secured IP device location schemes such as dynamic DNS.
In accordance with one or more embodiments, the proprietary router is one which is accessible via a proprietary message, such as a video signal and/or alarm signal from the video device, from an associated edge device, such as a video device (1.002A) or a customer terminal (1.006), and which processes such proprietary messages in a predetermined manner. For example, the proprietary router can communicate with an image/alarm converter to process received video signal by standardizing them to a format that is understood by the automation system. Further, the proprietary router may be configured to connect specified terminals to associated terminals. For example the proprietary router can connect the video device to an analytics device, network storage, and/or an image/alarm converter. The proprietary router may be adapted to terminate an incoming tunnel and establish an outgoing tunnel. An associated edge device may have access to a dedicated port of a proprietary router. Proprietary routers can be accessed via a public network.
According to one or more embodiments, a proprietary router can be adapted to be associated with not only a local area network (LAN) but also a wide area network (WAN), while remaining under the control of a proprietor of a dedicated communication network, rather than being under the control of the WAN operator. The proprietary router can have proprietary interfaces adapted to communicate with associated terminals. The network can include one or more proprietary routers.
As shown and described herein, various features of the disclosure will be presented. Various embodiments may have the same or similar features and thus the same or similar features may be labeled with the same reference numeral, but preceded by a different first number indicating the figure to which the feature is shown. Thus, for example, element “a” that is shown in FIG. X may be labeled “Xa” and a similar feature in FIG. Z may be labeled “Za.” Although similar reference numbers may be used in a generic sense, various embodiments will be described and various features may include changes, alterations, modifications, etc. as will be appreciated by those of skill in the art, whether explicitly described or otherwise would be appreciated by those of skill in the art.
Embodiments described herein are directed to a video surveillance system that provides remote monitoring. For example, according to one or more embodiments, a customer terminal can be provided which connects to a video device and sends video and status via the internet through an encrypted IP tunnel established to a network-based proprietary router which in turn delivers the video to the customer's smart phone and/or a central monitoring station to be used for video verification. In addition, the proprietary router routes the alarm messages from the edge device to the image/alarm converter which carries out protocol conversion on the alarms from the video devices into a format compatible with standard central monitoring stations. This protocol conversion, or standardization, allows the central monitoring station to respond to faults in the video system and access live or recorded video. Further, the tunnel allows the central monitoring station to remotely manage the equipment by, for example, remotely modifying configuration or remotely upgrading the firmware.
For example, turning now to
Further, as shown, the video device 1.002A communicates wirelessly with a local area network (LAN) 1.008 and then through a wide area network (WAN) 1.010 to reach resources that are located elsewhere in a network. Alternatively, according to another embodiment, the video device can be wired directly and communicate using the physical wire such as, for example, a cat5e, cat6, etc. The network can be a private network or can extend over the internet. As shown the video monitoring system also includes a proprietary router 1.012 that is able to communicate with the video device 1.002A over the network resources. The video device 1.002A is able to communicate by creating a secure communication channel between the proprietary router 1.012 and itself through the network elements as shown. Further the proprietary router 1.012 can create secure communication tunnels with other elements connected over the network such as the image/alarm converter 1.014 and an automation system 1.018 via the central station gateway (CSG) 1.013. According to one or more embodiments, the automation system 1.018 is located off-site outside the internet resources. For example the automation system 1.018 can be a security dispatch center that includes workstations and users that watch and monitor provided alarm and video feeds and dispatch security resources such as police, firemen, and ambulances depending on what is validated by a monitoring user on the video feeds.
Further, the video monitoring system includes a video device that includes a number of elements. Particularly, the video device includes an IP video camera 2.002 that can communicate via an IP network and via an IP tunnel that it establishes to the PR (2.012). The video device also includes a network video recorder (NVR) 2.022 that includes network attached storage (NAS) 2.020 that can also communicate via an IP network and via an IP tunnel that it establishes to the PR (2.012). The NVR 2.022 and included NAS 2.020 include tunneling software loaded on the device to allow for tunneling with the proprietary router 2.012. Thus, the NVR 2.022 can receive the video signal from the IP video camera 2.002, process and generate an alarm signal based on the video signal or for other reasons such as a hardware malfunction, and then transmit those signals to the PR 2.012 through the provided secure encrypted tunnel. The PR 2.012 may then convert the image signal and alarm signal using the image/alarm converter 2.014. The availability of the tunnel to maintain communications is monitored by the PR (2.012) which may generate an alarm message to the automation system (2.018) in the event that the tunnel is unable to support end-to-end communication. It will be apparent to those of ordinary skill in the art that the tunneling software embedded in the edge devices monitors the availability of the tunnel for communication with the PR (2.012) and makes ongoing attempts for its re-establishment in the event of it becoming unavailable.
Further, the video monitoring system includes not only a first video device 3.002.1 but a plurality of video devices. Particularly, as shown, the video monitoring system can include a second video device 3.002.2 and many more video devices, up to N 3.002.N each equipped with software allowing a connection to the PR (3.012) via a uniquely addressed encrypted tunnel. Each video device being monitored by the network are able to send alarm events and associated video to the automation system 3.018 as disclosed above in the event of a device malfunction or upon the detection of an alarm event through the use of video motion detection algorithms and the like.
According to one or more embodiments, the method may further include receiving the video signal and the alarm signal at an analytics device that is located on the network and communicatively connected to the proprietary router. Further the method can include temporally compressing the video signal based on the alarm signal.
According to another embodiment the method can include receiving the video signal and alarm signal at the automation system, and validating the received video signal and alarm signal at the automation system. Further, the method can include dispatching alarm resources in response to the validation using the automation system.
Advantageously, embodiments described herein provide a secure, easy to install means of monitoring video devices and their connectivity which is currently not provided or provided in an unsecured manner requiring considerable IP skills to install and configure. In addition, it allows the installing company to offer the customer an equipment monitoring service using standardized alarm monitoring automation systems which generates annuity revenues.
While the present disclosure has been described in detail in connection with only a limited number of embodiments, it should be readily understood that the present disclosure is not limited to such disclosed embodiments. Rather, the present disclosure can be modified to incorporate any number of variations, alterations, substitutions, combinations, sub-combinations, or equivalent arrangements not heretofore described, but which are commensurate with the scope of the present disclosure. Additionally, while various embodiments of the present disclosure have been described, it is to be understood that aspects of the present disclosure may include only some of the described embodiments.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the embodiments in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope of the disclosure. The embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand various embodiments with various modifications as are suited to the particular use contemplated.
The present embodiments may be a system, a method, and/or a computer program product at any possible technical detail level of integration. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present disclosure.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present disclosure may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++, or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present disclosure.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the blocks may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
The descriptions of the various embodiments have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Accordingly, the present disclosure is not to be seen as limited by the foregoing description, but is only limited by the scope of the appended claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2017/041455 | 7/11/2017 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2018/013516 | 1/18/2018 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5689442 | Swanson et al. | Nov 1997 | A |
5926210 | Hackett | Jul 1999 | A |
6970183 | Monroe | Nov 2005 | B1 |
7495687 | Dumas et al. | Feb 2009 | B2 |
7805719 | O'Neill | Sep 2010 | B2 |
8121078 | Siann et al. | Feb 2012 | B2 |
8520068 | Naidoo et al. | Aug 2013 | B2 |
8824487 | Ray | Sep 2014 | B1 |
8892699 | Mann | Nov 2014 | B2 |
9026648 | Slavin | May 2015 | B1 |
9131257 | Russo et al. | Sep 2015 | B2 |
9153111 | Trundle et al. | Oct 2015 | B2 |
9282297 | Siann et al. | Mar 2016 | B2 |
9307067 | Debates et al. | Apr 2016 | B2 |
20060177114 | Tongdee | Aug 2006 | A1 |
20060282886 | Gaug | Dec 2006 | A1 |
20090031381 | Cohen et al. | Jan 2009 | A1 |
20100245582 | Harel | Sep 2010 | A1 |
20120075469 | Oskin et al. | Mar 2012 | A1 |
20130166711 | Wang | Jun 2013 | A1 |
20140253316 | Addy et al. | Sep 2014 | A1 |
20140266685 | Brueggen et al. | Sep 2014 | A1 |
20140354821 | Monroe | Dec 2014 | A1 |
20150029335 | Kasmir et al. | Jan 2015 | A1 |
20150077553 | Dawes | Mar 2015 | A1 |
20150149991 | Chen et al. | May 2015 | A1 |
20150301526 | Tjandra | Oct 2015 | A1 |
20160105406 | Smith et al. | Apr 2016 | A1 |
20160105644 | Smith et al. | Apr 2016 | A1 |
Number | Date | Country |
---|---|---|
105187781 | Dec 2015 | CN |
2009029590 | Mar 2009 | WO |
2009107000 | Sep 2009 | WO |
2016085727 | Jun 2016 | WO |
Entry |
---|
International Search Report and Written Opinion for application PCT/US2017/041455, dated Nov. 7, 2017, 12 pages. |
SecurityGem, “Canary vs. iSmartAlarm vs. Piper Home Security”, available at: http://www.securitygem.com/canary-vs-ismartalarm-vs-piper-home-security , Nov. 19, 2015, 7 pages. |
Singtel, “Home LIVECam (Pan, Tilt & Zoom)” available at: http://www1.singtel.com/personal/internet/addons/homelivecam/detail.html accessed: Jan. 11, 2019, 5 pgs. |
European Search Report for Application No. 17740889.5; dated Jan. 14, 2021; 6 Pages. |
Number | Date | Country | |
---|---|---|---|
20190295392 A1 | Sep 2019 | US |
Number | Date | Country | |
---|---|---|---|
62362197 | Jul 2016 | US |